Introduction: Privacy, Data Protection and Cybersecurity in Europe
- ️Tue Apr 04 2017
Abstract
Our introduction consists of four steps. In the first, we prepare the field by defining and discussing the core concepts of this book—privacy, data protection and cybersecurity. All three issues come with a distinct research tradition, but in the digitised society, these issues increasingly overlap, which arguably necessitates a fresh scientific approach. In the second step, we try to disentangle the complex net of interests and dynamics around these issues by proposing an actor-based approach, distinguishing three ideal-types of actors: citizens/users, the business sector and the state which we understand as forming a triangular relationship, a “ménage a trois”, where all interests are also related to collective societal values such as security, efficiency, equality and trust. This concept is hardly novel, but it allows us to identify a distinct social science perspective on privacy and data protection as politically contested issues—a perspective which is currently largely missing in the literature. It also offers a framework for comparative studies, as for example societies can be expected to direct their regulatory efforts towards different balances of interests. In the third step, we focus particularly on cybersecurity and suggest on the basis of a literature review that discourse studies offer an interesting avenue for comparative study, advancing new research that goes beyond technicalities and connects cybersecurity with broader societal factors as identified above. In the fourth step, the introduction concludes with a brief overview of the individual contributions that we have organized in three sections.
Similar content being viewed by others
Notes
- 1.
Directive (EU) 2016/680 of the European Parliament and of the Council of 27 April 2016. The OECD also spells out in its Privacy Guidelines from 1980 a security safeguards principle according to which “Personal data should be protected by reasonable security safeguards against such risks as loss or unauthorised access, destruction, use, modification or disclosure of data.” (OECD 2013: 23).
References
Andress, J., & Winterfeld, S. (2011). Cyber warfare techniques. Tactics and tools for security practitioners. Amsterdam, Heidelberg [u.a.], Waltham, MA: Elsevier Syngress.
Arquilla, J., & Ronfeldt, D. (1997). Cyberwar is coming! In J. Arquilla & D. Ronfeldt (Eds.), In Athena’s camp. Preparing for conflict in the information age (pp. 23–60). Santa Monica, CA: Rand.
Balzacq, T. (2011). A theory of securitization. Origins, core assumptions, and variants. In T. Balzacq (Ed.), PRIO new security studies. Securitization theory. How security problems emerge and dissolve (1st ed., pp. 1–30). London [u.a.]: Routledge.
Baumann, M.-O. (2015). Privatsphäre als neues digitales Menschenrecht? Ethische Prinzipien und aktuelle Diskussionen. Hamburg: DIVSI Diskussionsbeiträge.
Bennett, C. J., & Raab, C. (2006). The governance of privacy. Policy instruments in global perspective. Cambridge: MIT Press.
Bentham, J. (2003 [1791]). Panopticon: or, the inspection-house. Containing the idea of a new principle of construction applicable to any sort of establishment, in which persons of any Description are to be kept under Inspection. and in particular to penitentiary-houses, prisons, Houses of Industry, Work-Houses, Poor-Houses, Manufactories, Mad-Houses, Hospitals, and Schools. With a plan of Management adapted to the Principle. In a series of letters, written in the Year 1787, From Crecheff in White Russia, to a Friend in England. Dublin: Eighteenth Century Collections Online. http://find.galegroup.com/ecco/infomark.do?&source=gale&prodId=ECCO&userGroupName=heidel&tabID=T001&docId=CW125793319&type=multipage&contentSet=ECCOArticles&version=1.0&docLevel=FASCIMILE
Berlinghoff, M. (2013). “Totalerfassung” im “Computerstaat”—Computer und Privatheit in den 1970er und 1980er Jahren. In U. Ackermann (Ed.), Im Sog des Internets. Öffentlichkeit und Privatheit im digitalen Zeitalter (pp. 93–110). Frankfurt am Main: Humanities Online.
Billo, C. G., & Chang, W. (2004). Cyber warfare. An analysis of the means and motivations of selected nation states. Dartmouth.
Busch, A., & Jakobi, T. (2011). Die Erfindung eines neuen Grundrechts: Zu Konzept und Auswirkungen der “informationellen Selbstbestimmung”. In C. Hönnige, S. Kneip, & A. Lorenz (Eds.), Verfassungswandel im Mehrebenensystem (pp. 297–320). Wiesbaden: VS Verlag für Sozialwissenschaften.
Buzan, B., Waever, O., & de Wilde, J. (1998). Security: A new framework for analysis. Boulder, CO: Lynne Rienner.
Capurro, R. (2005). Privacy. An intercultural perspective. Ethics and Information Technology, 7, 37–47.
Cate, F. H., & Mayer-Schönberger, V. (2013). Tomorrow’s privacy. Notice and consent in a world of Big Data. International Data Privacy Law, 3(2), 67–73.
Cohen, J. E. (2013). What privacy is for. Harvard Law Review, 126, 1904–1933.
Dunn Cavelty, M. (2013). Der Cyber-Krieg, der (so) nicht kommt: Erzählte Katastrophen als (Nicht)Wissenspraxis. In L. Hempel & M. Bartels (Eds.), Sozialtheorie. Aufbruch ins Unversicherbare. Zum Katastrophendiskurs der Gegenwart (2nd ed., pp. 209–233). Bielefeld: Transcript.
Easton, D. (1965). A systems analysis of political life. New York: Wiley.
Eckert, C. (2014). IT-Sicherheit: Konzepte, Verfahren, Protokolle, De Gruyter Studium (9th ed.). Oldenbourg: de Gruyter.
Eurobarometer. (2011). Attitudes on data protection and electronic identity in the European Union. Special Eurobarometer 359: Brussels: European Commission.
Foucault, M. (1981). Überwachen und Strafen: Die Geburt des Gefängnisses, Suhrkamp-Taschenbuch Wissenschaft (Vol. 184, 4th ed.). Frankfurt am Main: Suhrkamp.
Gaycken, S. (2012). Cyberwar. Das Wettrüsten hat längst begonnen. Vom digitalen Angriff zum realen Ausnahmezustand, Goldmann (Vol. 15710). München: Goldmann.
Gorr, D., & Schünemann, W. J. (2013). Creating a secure cyberspace: Securitization in Internet governance discourses and dispositives in Germany and Russia. International Review of Information Ethics, 20(12), 37–51. http://www.i-r-i-e.net/inhalt/020/IRIE-Gorr-Schuenemann.pdf.
Greenleaf, G. (2013). Data protection in a globalised network. In I. Brown (Ed.), Research handbook on governance of the Internet (pp. 221–259). Cheltenham: Edward Elgar.
Guitton, C. (2013). Cyber insecurity as a national threat: Overreaction from Germany, France and the UK? European Security, 20(1), 21–35.
Hansen, L., & Nissenbaum, H. (2009). Digital disaster, cyber security, and the copenhagen school. International Studies Quarterly, 53(4), 1155–1175. doi:10.1111/j.1468-2478.2009.00572.x.
Kubieziel, J. (2012). Anonym im Netz: Wie Sie sich und Ihre Daten schützen (3rd). user space. München: Open Source Press.
Lewis, J. A., & CSIS. (2015). Significant Cyber Incidents Since 2006. Washington, DC. http://csis.org/files/publication/150605_Significant_Cyber_Events_List.pdf
Lewis, J. A., & Neuneck, G. (Eds.). (2013). UNIDIR: Vol. 3. The Cyber Index: International Security Trends and Realities. http://www.unidir.org/files/publications/pdfs/cyber-index-2013-en-463.pdf
Neuneck, G. (2013). Assessment of international and regional activities. In J. A. Lewis & G. Neuneck (Eds.), UNIDIR: Vol. 3. The Cyber Index. International Security Trends and Realities (pp. 91–140).
New York Times Editorial Board. (2015, 4 February). Europe’s Expanding “Right to be Forgotten” (downloaded from http://www.nytimes.com/2015/02/04/opinion/europes-expanding-right-to-be-forgotten.html?_r=2).
Nissenbaum, H. (1998). Protecting privacy in an information age: The problem of privacy in public. Law and Philosophy, 17(5/6), 559–596.
Nissenbaum, H. (2005). Where computer security meets national security. Ethics and Information Technology, 7(2), 61–73. doi:10.1007/s10676-005-4582-3.
OECD. (2013). Exploring data-driven innovation as a new source of growth: Mapping the policy issues raised by “big data”. OECD Digital Economy Papers, No. 222. OECD Publishing, http://dx.doi.org/10.1787/5k47zw3fcp43-en.
Podesta, J. (2014). Big data: Seizing opportunities, preserving values. Washington, DC: Executive Office of the President.
Regan, P. M. (1995). Legislating privacy. Technology, social values, and public policy. Chapel Hill & London: The University of North Carolina Press.
Rid, T. (2012). Cyber war will not take place. Journal of Strategic Studies, 35(1), 5–32. doi:10.1080/01402390.2011.608939.
Rid, T., & Buchanan, B. (2015). Attributing cyber attacks. Journal of Strategic Studies, 38(1–2), 4–37.
Rössler, B. (2001). Der Wert des Privaten. Frankfurt am Main: Suhrkamp.
Rule, J. B., & Greenleaf, G. W. (Eds.). (2008). Global privacy protection: The first generation. Cheltenham: Edward Elgar.
Schermer, B. W., Custers, B., & van der Hof, S. (2014). The crisis of consent: How stronger legal protection may lead to weaker consent in data protection. Ethics and Information Technology, 2, 171–182.
Singer, P. W., & Friedman, A. (2014). Cybersecurity and cyberwar: What everyone needs to know. Oxford: Oxford University Press. (What everyone needs to know).
Solove, D. J. (2002). Conceptualizing privacy. California Law Review, 90(4), 1087–1155.
Stone, J. (2013). Cyber war will take place! Journal of Strategic Studies, 36(1), 101–108. doi:10.1080/01402390.2012.730485.
Valeriano, B., & Maness, R. C. (2014). The dynamics of cyber conflict between rival antagonists, 2001-11. Journal of Peace Research, 51(3), 347–360. doi:10.1177/0022343313518940.
Washington Post. (2015, 17 Feb). Obama says that Europeans are using privacy rules to protect their firms against U.S. competition. Is he right? Accessed Dec 6, 2016 from https://www.washingtonpost.com/news/monkey-cage/wp/2015/02/17/obama-says-that-europeans-are-using-privacy-rules-to-protect-their-firms-against-u-s-competition-is-he-right/?utm_term=.11da12667dec
Westin, A. F. (1970). Privacy and freedom. London: Bodley Head.
Author information
Authors and Affiliations
Deutsches Institut für Entwicklungspolitik, Bonn, Germany
Max-Otto Baumann
Hildesheim University, Hildesheim, Germany
Wolf J. Schünemann
Authors
- Max-Otto Baumann
You can also search for this author in PubMed Google Scholar
- Wolf J. Schünemann
You can also search for this author in PubMed Google Scholar
Corresponding author
Correspondence to Wolf J. Schünemann .
Editor information
Editors and Affiliations
Institute for Social Sciences, Hildesheim University, Hildesheim, Germany
Wolf J. Schünemann
German Development Institute, Bonn, Germany
Max-Otto Baumann
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this chapter
Cite this chapter
Baumann, MO., Schünemann, W.J. (2017). Introduction: Privacy, Data Protection and Cybersecurity in Europe. In: Schünemann, W., Baumann, MO. (eds) Privacy, Data Protection and Cybersecurity in Europe. Springer, Cham. https://doi.org/10.1007/978-3-319-53634-7_1
Download citation
DOI: https://doi.org/10.1007/978-3-319-53634-7_1
Published: 04 April 2017
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-53633-0
Online ISBN: 978-3-319-53634-7
eBook Packages: Political Science and International StudiesPolitical Science and International Studies (R0)